logo

GHSA-m3hp-8546-5qmr org.keycloak:keycloak-ldap-federation

Package

Manager: maven
Name: org.keycloak:keycloak-ldap-federation
Vulnerable Version: <0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: N/A

EPSS: N/A pctlN/A

Details

Duplicate Advisory: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-2p82-5wwr-43cw. This link is maintained to preserve external references. # Original Description A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions.

Metadata

Created: 2025-01-22T15:32:35Z
Modified: 2025-03-10T21:31:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-m3hp-8546-5qmr/GHSA-m3hp-8546-5qmr.json
CWE IDs: ["CWE-287"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0